Hi Viktor, * Viktor Rosenfeld <[EMAIL PROTECTED]> [24. Jul. 2002]: > David T-G wrote: > > ...and then Phil Gregory said... > > % encrypt-to <your key ID> > > % > > % to your ~/.gnupg/options file. This leaves them encrypted on disk but > > % still allows you to go back and look at them. > > > > ... and allows anyone who knows your keyid to know that the message has > > been encrypted to your key as well, thereby making the message very > > not-anonymous. Just so you're aware... > > Hmm, good point. Then again, I almost always sign my messages anyway, > so the key id is there in any case. But the idea with a secred, > unpublished key is nice.
Pgp/gpg first sign then encrypt. So only the repicient can check the sig (after encrypting the message). With gnupg you may even use --throw-keyid Do not put the keyid into encrypted packets. This option hides the receiver of the message and is a countermeasure against traffic analysis. It may slow down the decryption process because all avail- able secret keys are tried. So it is possible to send messages encrypted, signed and anonymously. Ciao, Gregor -- "The future is here. It's just not widely distributed yet." -- William Gibson